The ASUS WL-330NUL router has a configuration process that relies on accessing the 192.168.1.1 IP address, but the documentation advises users to instead access a DNS hostname that does not always resolve to 192.168.1.1, which makes it easier for remote attackers to hijack the configuration traffic by controlling the server associated with that hostname.
References
Link | Resource |
---|---|
http://www.kb.cert.org/vuls/id/191750 | Third Party Advisory US Government Resource |
http://www.securityfocus.com/bid/64799 | |
http://www.kb.cert.org/vuls/id/191750 | Third Party Advisory US Government Resource |
http://www.securityfocus.com/bid/64799 |
Configurations
History
21 Nov 2024, 02:00
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.kb.cert.org/vuls/id/191750 - Third Party Advisory, US Government Resource | |
References | () http://www.securityfocus.com/bid/64799 - |
Information
Published : 2014-01-15 16:13
Updated : 2025-04-11 00:51
NVD link : CVE-2013-7293
Mitre link : CVE-2013-7293
CVE.ORG link : CVE-2013-7293
JSON object : View
Products Affected
asus
- wl-330nul